9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

Byzantine Resistant Reputation-based Trust Management

Download664 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2013.254048,
        author={amira bradai and walid Ben-Ameur and hossam afifi},
        title={Byzantine Resistant Reputation-based Trust Management},
        proceedings={9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={ICST},
        proceedings_a={COLLABORATECOM},
        year={2013},
        month={11},
        keywords={trust management reputation credibility computing},
        doi={10.4108/icst.collaboratecom.2013.254048}
    }
    
  • amira bradai
    walid Ben-Ameur
    hossam afifi
    Year: 2013
    Byzantine Resistant Reputation-based Trust Management
    COLLABORATECOM
    IEEE
    DOI: 10.4108/icst.collaboratecom.2013.254048
amira bradai1,*, walid Ben-Ameur1, hossam afifi1
  • 1: telecom SudParis
*Contact email: amira.bradai@telecom-sudparis.eu

Abstract

Cloud computing is very useful for improving distributed applications performance. However, it is difficult to manage risks related to trust when collaborating with unknown and potentially malicious peers. Besides, trust evaluation is the target of dishonest behaviors trying to disturb the control process. In this paper, reputation-based trust management models for cloud computing are proposed. These Peer-to-Peer (P2P) reputation models are based on the interaction between peers. Using evaluations and feedbacks, a central entity can estimate the trust of a given peer. Three approaches are proposed to estimate the trust: PerronTrust, CredTrust and CredTrust-trust. They are studied, simulated and compared between them and to two existing methods for trust under several attack scenarios. Our analysis clearly shows that the third approach CredTrust-trust combining the concepts of trust and credibility in an appropriate way is the most efficient to avoid malicious behaviors and to guide and advise future executions in the open cloud in term of selecting the dependable and reliable peers in cloud environment.